智能运维
-
Step By Step Procedure To Fix The Plokit Vulnerability (CVE-2021-3560)
Another vulnerability found on the Polkit system could enable a local user to gain root privileges by bypassing authentication. It is very much required to test and fix the Plokit vulnerability (CVE-…
-
How Do (ALPACA ) TLS Cross-Protocol Attacks Lets Attackers Redirect HTTPS Traffic
A group of researchers from Ruhr University have been disclosed a new type of TLS Cross-Protocol Attacks that exploits misconfigurations in transport layer security (TLS) service to redirect applicat…
-
New Biometric Indicators!
Biometric indicators are used to uniquely identify people and allow access to buildings, facilities, and systems. Biometric authentication is widespread and is even used in smartphones, ATM kiosks, b…
-
Things You Should Know About Emerging Prometheus Ransomware Strain
Cybersecurity researchers revealed a new emerging player in the threat landscape. This new emerging Prometheus Ransomware Strain has claimed that it had been compromised 30 business just in four mont…
-
Learn About The New Bread Of Attacks Against Artificial Intelligence
Cybercriminals and threat actors never left any surface untouched. Artificial intelligence is not an exception. This new tech has given rise to a new breed of attacks against Artificial intelligence.…
-
14 New Chrome 0-Day Vulnerabilities - Update Your Chrome Immediately
An advisory from Google for those who are using Chrome browser. Google discovered 14 new Chrome 0-day vulnerabilities and asked to update the browser as soon as possible. Google has fixed the vulnera…
-
How Attackers Abused Kubeflow To Run Crypto Mining Campaigns Targeting Kubernetes Clusters
Researchers on 8 June 2021 reported a new large-scale active crypto-mining campaign targeting Kubernetes clusters abusing Kubeflow deployments to run malicious cryptocurrency mining containers. Table…
-
10 New Apple's Privacy & Security Features To Its Upcoming Versions Of iOS And MacOS
On 7th June 2021, Apple has announced an array of Apple’s privacy and security features to its upcoming versions of iOS 15, iPadOS 15, macOS Monterey, and watchOS 8at its WWDC 2021 ev…
-
Be Aware Of This New Windows Container Malware "Siloscape" Targeting Kubernetes Clusters
Security researchers have uncovered the first known Windows container malware, targeting Windows Server containers to infect Kubernetes clusters in cloud environments. The malware was named ‘Si…
-
How Are Threat Actors Abusing Apple's TCC Protection Using XCSSET Malware Attacks?
Apple Releases Patches to Counter New Zero-day XCSSET Malware Attacks on macOS Apple has recently released security updates for macOS, tcOS, watchOS, iOS, and Safari web browser to fix several vulner…